Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

large stack of papers

Can Threat Modeling Really Help Fight Cyber Burnout?

Cyber burnout is a real thing. What it is? What exactly is cyber burnout or cyber fatigue? According to Stacy Thayer, speaking at blackhat 2022...
interconnected gears

How Threat Modeling is Being Reinvented Today

Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you...
dice logo

DevSecOps Engineer: An Emerging Cybersecurity Career Path

With more and more organizations relying on cloud-based tools to fuel their digital transformation projects and drive future growth, quickly...
Devops Digest logo

DevSecOps and the Evolution of Threat Modeling

Threat modeling has become an integral part of the software development process, providing developers with an opportunity to identify security threats...
two people shaking hands

Why it’s Important to Build a Threat Modeling Culture

There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand...
TechTarget logo

How to create and manage a rock-solid DevSecOps framework

Security has long been treated as an afterthought in software development. Developers work to create effective code but only consider software...
SC media logo

A New Type of Cryptomining Attack Aims to Hijack Network Bandwidth

Researchers on Tuesday found a new type of crypto-mining attack in the wild that’s designed to hijack network bandwidth. Read the full article here If...
cluttered work desk

A Case for Automated Threat Modeling

Nobody thinks modeling threats is a bad idea. And yet threat modeling isn’t broadly adopted in the development community yet. Why is that? According...
dock over the water

A Glimpse Into the Future of Threat Modeling

Like everything else in the world of cybersecurity, threat modeling tools and practices continue to evolve. How is threat modeling evolving? There are...